
How to fool blind chance, or Lottery scams of the digital age
Now, a great number to attract your attention: $16.5 million. This is how much the jackpot was for a lottery ticket one man arranged to win.
3309 articles
Now, a great number to attract your attention: $16.5 million. This is how much the jackpot was for a lottery ticket one man arranged to win.
Online dating fraud cost victims millions last year. Be vigilant and protect yourself!
Good news, everyone! We have help for victims of Shade ransomware. Now you can decrypt the data without paying ransom.
When Canada-based adultery site Ashley Madison was hacked, cybercriminals wasted no time in taking advantage of it. Even now, a year later, they continue to blackmail people and hold their data hostage. We look back at what happened then and talk about what’s happening now.
The threat landscape is ever changing, and our Global Research and Analysis Team (GReAT) is constantly looking at new attacks and finding ways to help protect the world from those
How to protect yourself from ransomware? Are there any cross-platform cryptors? How much time does it take to catch a cybercriminal? Jornt van der Wiel discusses all of that and more
Did you know that some apps on your iPhone or iPad track your location, access your camera and calendar, and more? In Part 1 of this story, we show you how to turn off tracking using iOS’s privacy features.
As the Olympic Games in Rio draw nearer, cybercriminals are preparing more and more traps for sports fans. They make use of all kinds of tactics: phishing letters and fake
Kaspersky Lab experts checked industrial control systems for vulnerabilities and found lots of them.
Everything you need to know about safe posting on any social network, boiled down to five crucial rules.
Ranscam deletes your files and then demands ransom to restore them, or it will delete them. Yes, in that order.
I remember when Pokémon came out on the Nintendo Gameboy. It was a challenging game that had my friends and me trying to catch all of the monsters. It was
This year, news of ransomware attacks have been coming in like dispatches from a battlefield — nonstop. Every day, researchers find new strains of ransomware and discover new and unconventional
If the rumors are true, 40 million Apple iCloud accounts have been hacked
Ded Cryptor ransomware is based on EDA2 — an open-source cryptor. EDA2 was created for educational purposes, but then things went horribly wrong.
Once, hackers wrote malware just for the fun of it, but now Trojans are serious business. However, here are five modern, weird malware samples that may be funny and strange, but they are still very dangerous.
Criminals are stealing money from freelancers — by offering them a job.
Apple no longer encrypts the kernel of its iOS operating system. It seems that this is another step towards turning iOS into something similar to Android.
Accurate identification of people’s faces is a very human process but computers are gaining on our processing. A look at what’s going on now and what we’ll see soon.
Have you ever received a letter from a Nigerian prince? A Nigerian astronaut? How about Daenerys Targaryen? If so, you know that we are talking about funny Nigerian spam — and this post covers it all!
Mobile ransomware is on the rise. We discuss the most popular ransomware families, speculate on some statistics, and suggest the best means of protection.